1
0

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?

More than 3 years have passed since last update.

【AZ-301】Azure Architect Design - Azure AD

Last updated at Posted at 2020-06-16

Azure AD Domain Service

features

  • Simplified deployment experience: Azure AD DS is enabled for your Azure AD tenant using a single wizard in the Azure portal.
  • Integrated with Azure AD: User accounts, group memberships, and credentials are automatically available from your Azure AD tenant. New users, groups, or changes to attributes from your Azure AD tenant or your on-premises AD DS environment are automatically synchronized to Azure AD DS.
    • Accounts in external directories linked to your Azure AD aren't available in Azure AD DS. Credentials aren't available for those external directories, so can't be synchronized into an Azure AD DS managed domain.
  • Use your corporate credentials/passwords: Passwords for users in Azure AD DS are the same as in your Azure AD tenant. Users can use their corporate credentials to domain-join machines, sign in interactively or over remote desktop, and authenticate against the Azure AD DS managed domain.
  • NTLM and Kerberos authentication: With support for NTLM and Kerberos authentication, you can deploy applications that rely on Windows-integrated authentication.
  • High availability: Azure AD DS includes multiple domain controllers, which provide high availability for your managed domain. This high availability guarantees service uptime and resilience to failures.
    • In regions that support Azure Availability Zones, these domain controllers are also distributed across zones for additional resiliency.

Azure AD Managed Service Identity

All Azure resources that support managed identities can obtain tokens to exchange data without having credentials in the code. The process consists of the following steps:

  • Enable – Create the Managed Identity for the resource.
  • Grant access – Allow access to resources with Azure RBAC.
  • Access - Perform the allowed actions.
  • Disable – Delete the Managed Identity.

Managed identity types

  • System-assigned managed identity
  • User-assigned managed identity

Azure AD Connect

編集中

Conditional Access

The modern security perimeter now extends beyond an organization's network to include user and device identity. Organizations can utilize these identity signals as part of their access control decisions.

Azure AD Privileged Identity Management (PIM)

Azure Active Directory (Azure AD) Privileged Identity Management (PIM) is a service that enables you to manage, control, and monitor access to important resources in your organization. These resources include resources in Azure AD, Azure, and other Microsoft Online Services like Office 365 or Microsoft Intune.

Key feature

  • Provide just-in-time privileged access to Azure AD and Azure resources
  • Assign time-bound access to resources using start and end dates
  • Require approval to activate privileged roles
  • Enforce multi-factor authentication to activate any role
  • Use justification to understand why users activate
  • Get notifications when privileged roles are activated
  • Conduct access reviews to ensure users still need roles
  • Download audit history for internal or external audit

License requirements

Azure AD Premium P2 license

Azure AD Identity Protection

Identity Protection is a tool that allows organizations to accomplish three key tasks

  • Automate the detection and remediation of identity-based risks.
  • Investigate risks using data in the portal.
  • Export risk detection data to third-party utilities for further analysis.

Permissions

Role Can do Can't do
Global administrator Full access to Identity Protection
Security administrator Full access to Identity Protection Reset password for a user
Security operator View all Identity Protection reports and Overview blade
Dismiss user risk, confirm safe sign-in, confirm compromise
Configure or change policies
Reset password for a user
Configure alerts
Security reader View all Identity Protection reports and Overview blade Configure or change policies
Reset password for a user
Configure alerts
Give feedback on detections

License requirements

Capability Details Azure AD Premium P2 Azure AD Premium P1 Azure AD Basic/Free
Risk policies User risk policy (via Identity Protection) Yes No No
Risk policies Sign-in risk policy (via Identity Protection or Conditional Access) Yes No No
Security reports Overview Yes No No
Security reports Risky users Full access Limited Information Limited Information
Security reports Risky sign-ins Full access Limited Information Limited Information
Security reports Risk detections Full access Limited Information No
Notifications Users at risk detected alerts Yes No No
Notifications Weekly digest Yes No No
MFA registration policy Yes No No

Azure AD B2C

A customer identity access management (CIAM) solution capable of supporting millions of users and billions of authentications per day. It takes care of the scaling and safety of the authentication platform, monitoring and automatically handling threats like denial-of-service, password spray, or brute force attacks. image

Single sign-on access with a user-provided identity

image

Third-party identity verification and proofing

image

1
0
0

Register as a new user and use Qiita more conveniently

  1. You get articles that match your needs
  2. You can efficiently read back useful information
  3. You can use dark theme
What you can do with signing up
1
0

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?